Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
SlideShare a Scribd company logo
What obstacles and opportunities might be in store for
your organization? These 2023 forecasts from leaders
at the cyber front lines reveal a range of insights and
strategies, from greater emphasis on future forward
readiness to the increased role organizational resilience
will play in controlling exposure to threats and
managing multifaceted risks.
Cybersecurity in 2023 and beyond:
12 leaders share their forecasts
While the stakes are high for addressing the complex
cyber and risk challenges of 2023 and beyond, Deloitte
can help you meet your objectives, whether you need
assistance with strategy, design, implementation, or
ongoing operations. We offer a unified approach to help
you tackle obstacles, build new capabilities, and move
forward fast—wherever you are on your journey.
Learn more at Deloitte.com/us/MoveForwardFast
For the challenges you can’t predict,
and the opportunities you can’t pass up
This publication contains general information only and Deloitte is not, by means of this publication, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This publication
is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your
business, you should consult a qualified professional advisor. Deloitte shall not be responsible for any loss sustained by any person who relies on this publication.
As used in this document, “Deloitte” means Deloitte & Touche LLP, a subsidiary of Deloitte LLP. Please see www.deloitte.com/us/about for a detailed description of our legal structure. Certain services may not be available
to attest clients under the rules and regulations of public accounting.
Copyright © 2023 Deloitte Development LLC. All rights reserved.
AGILE, SECURE
MODERNIZATION
Vikram Kunchala
Cyber Cloud and Infrastructure Leader,
Deloitte & Touche LLP
Proliferating cloud services
create new possibilities and risks
“The huge shift to cloud-based data and business
functions has created unprecedented possibilities—
but comes with costly regulatory missteps and
damaging cyberattacks when security is not woven
into the process. Organizations can enable agile,
secure transformation by leveraging “secure-by-
design” processes and Zero Trust principles.”
Asheem Chandna
Investor and Company Builder,
Greylock Partners
The shift-left
movement will improve
application security
“Developers won’t be working in
isolation; security improvements will be
embedded in the process of application
creation throughout the process from
development to production.”
Deborah Golden
US Cyber & Strategic Risk Leader,
Deloitte & Touche LLP
Growing talent shortages
and labor costs will lead to
cyber talent consolidation
and outsourcing
“With cybersecurity risks and regulations
increasing by the day, many organizations are
scrambling to fill positions. To stay agile, they’ll
need to focus on hiring niche cyber talent
along with outsourcing strategies.”
Jay Leek
Managing Partner & Co-founder,
SYN Ventures
Humans can’t do it alone
“The combination of ongoing talent
shortages and increasing efforts from
adversaries makes automation critical.
Humans just can’t respond fast enough.
Software is needed to fight software—
for detection, response, and prevention.”
Ken Gonzalez
Managing Director,
NightDragon Investments & Advisory
Machines can’t do it alone,
either
“If you automate a bad process, you’re
just running yourself off a cliff. You still
need process best practices and people
to oversee it.”
Mary Galligan
Crisis Management Leader,
Deloitte & Touche LLP
Boards will increasingly
view cyber readiness as a
business imperative
“The role that the board plays in cyber
oversight is becoming more important, as is
their ability to position cyber as a strategic
enabler across customer, vendor, employee,
and shareholder relationships.”
Asheem Chandna
Investor and Company Builder,
Greylock Partners
Geopolitics will make
the attack surface
more complicated
“On the attack side, threats aren’t just from
individual bad actors, but also nation states.
It will be very hard for organizations to manage
threat protection themselves, as these attacks
have high levels of sophistication.”
Ken Gonzalez
Managing Director,
NightDragon Investments & Advisory
Companies will drive
innovation to solve
global issues
“There’s a shared sense of corporate social
responsibility—a mission to protect our way of
life, governments, families, and corporations—
that’s driving new innovations.”
Pete Renneker
Technical Resilience Leader,
Deloitte & Touche LLP
Focus on organizational
resilience will continue to grow
“The multitude of supply chain, geopolitical,
environmental and cyber disruptions are
challenging traditional risk programs. An integrated
view of risks can help lead organizations to employ
new techniques and technologies to improve
threat awareness and response.”
Criss Bradbury
Data & Privacy Solution Leader,
Deloitte & Touche LLP
Brand trust will be built
on data-centric security
“There is growing urgency for
organizations to embrace data privacy,
security, and compliance as mechanisms
to bolster customer experience, trust,
and brand perception.”
Deborah Golden
US Cyber & Strategic Risk Leader,
Deloitte & Touche LLP
Organizations can build agility
with future-ready cyber tech
“Breakthrough cyber tech, including AI, will lead
to a more proactive risk approach as well as
greater innovation, competitive differentiation,
and operational excellence. Organizations
need to actively build a unified cyber
strategy to be agile enough to seize future
opportunities before they emerge.”
Kieran Norton
Transformation & Emerging
Technology Market Leader,
Deloitte & Touche LLP
Security will be a critical
enabler in the adoption of
emerging tech
“The sustained success of IoT, Blockchain, 5G,
Quantum, and other applications will largely be
based on the ability to navigate and implement
appropriate cybersecurity technology measures
in tandem with adoption.”
FUTURE
FORWARD
READINESS
AND RESILIENT
DIGITAL
OPERATIONS
TRUSTED
CUSTOMER
EXPERIENCES
AND DATA
USE
Sharon Chand
Secure Supply Chain Leader,
Deloitte & Touche LLP
Comprehensive supply chain
security is imperative
“Supply chain threats continue to evolve
in complexity, requiring a greater focus on
deploying and operating identity and access
management (IAM) and Zero Trust capabilities
to enforce authorized third-party access.”
SUPPLY
CHAIN SECURITY
AND RISK
TRANSFORMATION
SECURE,
EFFICIENT
WORKFORCE
EXPERIENCE
DYNAMIC RISK
PROGRAMS
AND ENHANCED
RESPONSE AND
RECOVERY
GOVERNANCE
AND
OPTIMIZATION
Asheem Chandna
Investor and Company Builder,
Greylock Partners
Expanding attack surfaces
will be secured through
increased automation
“With the expanding threat surface becoming
more complex for most organizations, there
is a tremendous opportunity to leverage
APIs that can improve automated threat
detection using AI and ML.”
Ramsey Hajj
Cyber OT Leader,
Deloitte & Touche LLP
Threats to operational
technologies will continue
to evolve rapidly
“Operational technology (OT) environments are
increasingly being weaponized. This is prompting
greater visibility into OT devices, networks, and an
increase in monitoring tools to better correlate
security of OT and IT networks.”
Wendy Frank
Cyber IoT Leader,
Deloitte & Touche LLP
Device visibility and security
will be a major area of focus
“As the number of IoT-connected devices
grows, the attack surface grows with it. Leading
organizations will need to increase their focus on
device policies, procedures, and inventories, as
well as closer monitoring of those devices.”
SECURE,
CONNECTED
DEVICES AND
INTELLIGENT
OPERATIONS

More Related Content

Similar to 2023 Cyber Forecast Infographic

End-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to GreatEnd-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to Great
accenture
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Down
accenture
 
Compliance & data security – the way we work
Compliance & data security – the way we workCompliance & data security – the way we work
Compliance & data security – the way we work
Puneet Chopra
 
Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts final
Daren Dunkel
 
Lead Through Disruption Guide PDF
Lead Through Disruption Guide PDFLead Through Disruption Guide PDF
Lead Through Disruption Guide PDF
Deloitte United States
 
RSA Security Brief : Taking Charge of Security in a Hyperconnected World
RSA Security Brief : Taking Charge of Security in a Hyperconnected WorldRSA Security Brief : Taking Charge of Security in a Hyperconnected World
RSA Security Brief : Taking Charge of Security in a Hyperconnected World
EMC
 
The Importance of Cyber Security Consultants in the Digital Age.pdf
The Importance of Cyber Security Consultants in the Digital Age.pdfThe Importance of Cyber Security Consultants in the Digital Age.pdf
The Importance of Cyber Security Consultants in the Digital Age.pdf
Future Education Magazine
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-Effectiveness
Ayham Kochaji
 
A smarter way to manage identities
A smarter way to manage identitiesA smarter way to manage identities
A smarter way to manage identities
Matthew Zielinski, CISSP, CBCP
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious Game
Tatainteractive1
 
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibmciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
Priyanka Aash
 
BizCarta-2
BizCarta-2BizCarta-2
BizCarta-2
Pradeep Kumar
 
Laurel Group Thought Leaders Print 0213
Laurel Group Thought Leaders Print 0213Laurel Group Thought Leaders Print 0213
Laurel Group Thought Leaders Print 0213
Davis Blair
 
HUMAN FACTOR AND IT/OT CORRELATION
HUMAN FACTOR AND IT/OT CORRELATION HUMAN FACTOR AND IT/OT CORRELATION
HUMAN FACTOR AND IT/OT CORRELATION
Andrea Vallavanti
 
The 10 most innovative compliance assessment service provider 2021(1) compressed
The 10 most innovative compliance assessment service provider 2021(1) compressedThe 10 most innovative compliance assessment service provider 2021(1) compressed
The 10 most innovative compliance assessment service provider 2021(1) compressed
insightssuccess2
 
Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends
Enterprise Management Associates
 
The 10 most trusted networking and security solution providers
The 10 most trusted networking and security solution providersThe 10 most trusted networking and security solution providers
The 10 most trusted networking and security solution providers
Merry D'souza
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
Laurie Mosca-Cocca
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
Pablo Junco
 
Optiv Security Award Write Up
Optiv Security Award Write UpOptiv Security Award Write Up
Optiv Security Award Write Up
Claudia Toscano
 

Similar to 2023 Cyber Forecast Infographic (20)

End-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to GreatEnd-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to Great
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Down
 
Compliance & data security – the way we work
Compliance & data security – the way we workCompliance & data security – the way we work
Compliance & data security – the way we work
 
Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts final
 
Lead Through Disruption Guide PDF
Lead Through Disruption Guide PDFLead Through Disruption Guide PDF
Lead Through Disruption Guide PDF
 
RSA Security Brief : Taking Charge of Security in a Hyperconnected World
RSA Security Brief : Taking Charge of Security in a Hyperconnected WorldRSA Security Brief : Taking Charge of Security in a Hyperconnected World
RSA Security Brief : Taking Charge of Security in a Hyperconnected World
 
The Importance of Cyber Security Consultants in the Digital Age.pdf
The Importance of Cyber Security Consultants in the Digital Age.pdfThe Importance of Cyber Security Consultants in the Digital Age.pdf
The Importance of Cyber Security Consultants in the Digital Age.pdf
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-Effectiveness
 
A smarter way to manage identities
A smarter way to manage identitiesA smarter way to manage identities
A smarter way to manage identities
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious Game
 
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibmciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
 
BizCarta-2
BizCarta-2BizCarta-2
BizCarta-2
 
Laurel Group Thought Leaders Print 0213
Laurel Group Thought Leaders Print 0213Laurel Group Thought Leaders Print 0213
Laurel Group Thought Leaders Print 0213
 
HUMAN FACTOR AND IT/OT CORRELATION
HUMAN FACTOR AND IT/OT CORRELATION HUMAN FACTOR AND IT/OT CORRELATION
HUMAN FACTOR AND IT/OT CORRELATION
 
The 10 most innovative compliance assessment service provider 2021(1) compressed
The 10 most innovative compliance assessment service provider 2021(1) compressedThe 10 most innovative compliance assessment service provider 2021(1) compressed
The 10 most innovative compliance assessment service provider 2021(1) compressed
 
Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends
 
The 10 most trusted networking and security solution providers
The 10 most trusted networking and security solution providersThe 10 most trusted networking and security solution providers
The 10 most trusted networking and security solution providers
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
 
Optiv Security Award Write Up
Optiv Security Award Write UpOptiv Security Award Write Up
Optiv Security Award Write Up
 

More from Deloitte United States

Digital Asset Risk and Regulatory Compliance Expectations for 2024
Digital Asset Risk and Regulatory Compliance Expectations for 2024Digital Asset Risk and Regulatory Compliance Expectations for 2024
Digital Asset Risk and Regulatory Compliance Expectations for 2024
Deloitte United States
 
Setting the AI table: Leave a seat for legal
Setting the AI table: Leave a seat for legalSetting the AI table: Leave a seat for legal
Setting the AI table: Leave a seat for legal
Deloitte United States
 
Turning diligence insights into actionable integration steps
Turning diligence insights into actionable integration stepsTurning diligence insights into actionable integration steps
Turning diligence insights into actionable integration steps
Deloitte United States
 
Emerging Technologies in Transformations Drive the Need for Evolving Internal...
Emerging Technologies in Transformations Drive the Need for Evolving Internal...Emerging Technologies in Transformations Drive the Need for Evolving Internal...
Emerging Technologies in Transformations Drive the Need for Evolving Internal...
Deloitte United States
 
Almost Half of Executives Expect Supply Chain Security Challenges in Year Ahead
Almost Half of Executives Expect Supply Chain Security Challenges in Year AheadAlmost Half of Executives Expect Supply Chain Security Challenges in Year Ahead
Almost Half of Executives Expect Supply Chain Security Challenges in Year Ahead
Deloitte United States
 
Pivotal Moments All-in-One_FINAL.pdf
Pivotal Moments All-in-One_FINAL.pdfPivotal Moments All-in-One_FINAL.pdf
Pivotal Moments All-in-One_FINAL.pdf
Deloitte United States
 
Divestiture Trends: 2023 Could See More Sell-Offs, but Expect Lengthier and M...
Divestiture Trends: 2023 Could See More Sell-Offs, but Expect Lengthier and M...Divestiture Trends: 2023 Could See More Sell-Offs, but Expect Lengthier and M...
Divestiture Trends: 2023 Could See More Sell-Offs, but Expect Lengthier and M...
Deloitte United States
 
Cash and Liquidity Management Confidence Levels Declining Among Executives, a...
Cash and Liquidity Management Confidence Levels Declining Among Executives, a...Cash and Liquidity Management Confidence Levels Declining Among Executives, a...
Cash and Liquidity Management Confidence Levels Declining Among Executives, a...
Deloitte United States
 
Few are Confident in Their Organizations’ Ability to Report on ESG Financials
Few are Confident in Their Organizations’ Ability to Report on ESG FinancialsFew are Confident in Their Organizations’ Ability to Report on ESG Financials
Few are Confident in Their Organizations’ Ability to Report on ESG Financials
Deloitte United States
 
Deloitte Poll: Legacy Tech Poses a Challenge to Zero Trust Adoption
Deloitte Poll: Legacy Tech Poses a Challenge to Zero Trust AdoptionDeloitte Poll: Legacy Tech Poses a Challenge to Zero Trust Adoption
Deloitte Poll: Legacy Tech Poses a Challenge to Zero Trust Adoption
Deloitte United States
 
Private Equity Leads Corporate Deal Teams on ESG in M&A
Private Equity Leads Corporate Deal Teams on ESG in M&APrivate Equity Leads Corporate Deal Teams on ESG in M&A
Private Equity Leads Corporate Deal Teams on ESG in M&A
Deloitte United States
 
Almost Half of Executives Expect a Rise in Cyber Events Targeting Accounting ...
Almost Half of Executives Expect a Rise in Cyber Events Targeting Accounting ...Almost Half of Executives Expect a Rise in Cyber Events Targeting Accounting ...
Almost Half of Executives Expect a Rise in Cyber Events Targeting Accounting ...
Deloitte United States
 
Could M&A Activity be a Springboard for Controllership Transformation?
Could M&A Activity be a Springboard for Controllership Transformation?Could M&A Activity be a Springboard for Controllership Transformation?
Could M&A Activity be a Springboard for Controllership Transformation?
Deloitte United States
 
Putting intercompany accounting back in the spotlight: Controllership Perspec...
Putting intercompany accounting back in the spotlight: Controllership Perspec...Putting intercompany accounting back in the spotlight: Controllership Perspec...
Putting intercompany accounting back in the spotlight: Controllership Perspec...
Deloitte United States
 
Many C-suite Executives Say Their Organizations Want to Build Trust in Year A...
Many C-suite Executives Say Their Organizations Want to Build Trust in Year A...Many C-suite Executives Say Their Organizations Want to Build Trust in Year A...
Many C-suite Executives Say Their Organizations Want to Build Trust in Year A...
Deloitte United States
 
Harvest Now, Decrypt Later Attacks Pose a Security Concern as Organizations C...
Harvest Now, Decrypt Later Attacks Pose a Security Concern as Organizations C...Harvest Now, Decrypt Later Attacks Pose a Security Concern as Organizations C...
Harvest Now, Decrypt Later Attacks Pose a Security Concern as Organizations C...
Deloitte United States
 
SOX modernization: Optimizing compliance while extracting value
SOX modernization: Optimizing compliance while extracting valueSOX modernization: Optimizing compliance while extracting value
SOX modernization: Optimizing compliance while extracting value
Deloitte United States
 
A new working relationship: Aligning organizations with the workforce of the ...
A new working relationship: Aligning organizations with the workforce of the ...A new working relationship: Aligning organizations with the workforce of the ...
A new working relationship: Aligning organizations with the workforce of the ...
Deloitte United States
 
Hospitality Accounting Update Spring 2022
Hospitality Accounting Update Spring 2022Hospitality Accounting Update Spring 2022
Hospitality Accounting Update Spring 2022
Deloitte United States
 
TEI Conference Deloitte Private Brochure
TEI Conference Deloitte Private BrochureTEI Conference Deloitte Private Brochure
TEI Conference Deloitte Private Brochure
Deloitte United States
 

More from Deloitte United States (20)

Digital Asset Risk and Regulatory Compliance Expectations for 2024
Digital Asset Risk and Regulatory Compliance Expectations for 2024Digital Asset Risk and Regulatory Compliance Expectations for 2024
Digital Asset Risk and Regulatory Compliance Expectations for 2024
 
Setting the AI table: Leave a seat for legal
Setting the AI table: Leave a seat for legalSetting the AI table: Leave a seat for legal
Setting the AI table: Leave a seat for legal
 
Turning diligence insights into actionable integration steps
Turning diligence insights into actionable integration stepsTurning diligence insights into actionable integration steps
Turning diligence insights into actionable integration steps
 
Emerging Technologies in Transformations Drive the Need for Evolving Internal...
Emerging Technologies in Transformations Drive the Need for Evolving Internal...Emerging Technologies in Transformations Drive the Need for Evolving Internal...
Emerging Technologies in Transformations Drive the Need for Evolving Internal...
 
Almost Half of Executives Expect Supply Chain Security Challenges in Year Ahead
Almost Half of Executives Expect Supply Chain Security Challenges in Year AheadAlmost Half of Executives Expect Supply Chain Security Challenges in Year Ahead
Almost Half of Executives Expect Supply Chain Security Challenges in Year Ahead
 
Pivotal Moments All-in-One_FINAL.pdf
Pivotal Moments All-in-One_FINAL.pdfPivotal Moments All-in-One_FINAL.pdf
Pivotal Moments All-in-One_FINAL.pdf
 
Divestiture Trends: 2023 Could See More Sell-Offs, but Expect Lengthier and M...
Divestiture Trends: 2023 Could See More Sell-Offs, but Expect Lengthier and M...Divestiture Trends: 2023 Could See More Sell-Offs, but Expect Lengthier and M...
Divestiture Trends: 2023 Could See More Sell-Offs, but Expect Lengthier and M...
 
Cash and Liquidity Management Confidence Levels Declining Among Executives, a...
Cash and Liquidity Management Confidence Levels Declining Among Executives, a...Cash and Liquidity Management Confidence Levels Declining Among Executives, a...
Cash and Liquidity Management Confidence Levels Declining Among Executives, a...
 
Few are Confident in Their Organizations’ Ability to Report on ESG Financials
Few are Confident in Their Organizations’ Ability to Report on ESG FinancialsFew are Confident in Their Organizations’ Ability to Report on ESG Financials
Few are Confident in Their Organizations’ Ability to Report on ESG Financials
 
Deloitte Poll: Legacy Tech Poses a Challenge to Zero Trust Adoption
Deloitte Poll: Legacy Tech Poses a Challenge to Zero Trust AdoptionDeloitte Poll: Legacy Tech Poses a Challenge to Zero Trust Adoption
Deloitte Poll: Legacy Tech Poses a Challenge to Zero Trust Adoption
 
Private Equity Leads Corporate Deal Teams on ESG in M&A
Private Equity Leads Corporate Deal Teams on ESG in M&APrivate Equity Leads Corporate Deal Teams on ESG in M&A
Private Equity Leads Corporate Deal Teams on ESG in M&A
 
Almost Half of Executives Expect a Rise in Cyber Events Targeting Accounting ...
Almost Half of Executives Expect a Rise in Cyber Events Targeting Accounting ...Almost Half of Executives Expect a Rise in Cyber Events Targeting Accounting ...
Almost Half of Executives Expect a Rise in Cyber Events Targeting Accounting ...
 
Could M&A Activity be a Springboard for Controllership Transformation?
Could M&A Activity be a Springboard for Controllership Transformation?Could M&A Activity be a Springboard for Controllership Transformation?
Could M&A Activity be a Springboard for Controllership Transformation?
 
Putting intercompany accounting back in the spotlight: Controllership Perspec...
Putting intercompany accounting back in the spotlight: Controllership Perspec...Putting intercompany accounting back in the spotlight: Controllership Perspec...
Putting intercompany accounting back in the spotlight: Controllership Perspec...
 
Many C-suite Executives Say Their Organizations Want to Build Trust in Year A...
Many C-suite Executives Say Their Organizations Want to Build Trust in Year A...Many C-suite Executives Say Their Organizations Want to Build Trust in Year A...
Many C-suite Executives Say Their Organizations Want to Build Trust in Year A...
 
Harvest Now, Decrypt Later Attacks Pose a Security Concern as Organizations C...
Harvest Now, Decrypt Later Attacks Pose a Security Concern as Organizations C...Harvest Now, Decrypt Later Attacks Pose a Security Concern as Organizations C...
Harvest Now, Decrypt Later Attacks Pose a Security Concern as Organizations C...
 
SOX modernization: Optimizing compliance while extracting value
SOX modernization: Optimizing compliance while extracting valueSOX modernization: Optimizing compliance while extracting value
SOX modernization: Optimizing compliance while extracting value
 
A new working relationship: Aligning organizations with the workforce of the ...
A new working relationship: Aligning organizations with the workforce of the ...A new working relationship: Aligning organizations with the workforce of the ...
A new working relationship: Aligning organizations with the workforce of the ...
 
Hospitality Accounting Update Spring 2022
Hospitality Accounting Update Spring 2022Hospitality Accounting Update Spring 2022
Hospitality Accounting Update Spring 2022
 
TEI Conference Deloitte Private Brochure
TEI Conference Deloitte Private BrochureTEI Conference Deloitte Private Brochure
TEI Conference Deloitte Private Brochure
 

Recently uploaded

GDG Cloud Southlake #34: Neatsun Ziv: Automating Appsec
GDG Cloud Southlake #34: Neatsun Ziv: Automating AppsecGDG Cloud Southlake #34: Neatsun Ziv: Automating Appsec
GDG Cloud Southlake #34: Neatsun Ziv: Automating Appsec
James Anderson
 
HTTP Adaptive Streaming – Quo Vadis (2024)
HTTP Adaptive Streaming – Quo Vadis (2024)HTTP Adaptive Streaming – Quo Vadis (2024)
HTTP Adaptive Streaming – Quo Vadis (2024)
Alpen-Adria-Universität
 
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALLBLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
Liveplex
 
DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
Yevgen Sysoyev
 
Calgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptxCalgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptx
ishalveerrandhawa1
 
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Chris Swan
 
How to Avoid Learning the Linux-Kernel Memory Model
How to Avoid Learning the Linux-Kernel Memory ModelHow to Avoid Learning the Linux-Kernel Memory Model
How to Avoid Learning the Linux-Kernel Memory Model
ScyllaDB
 
@Call @Girls Guwahati 🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cute Girl any...
@Call @Girls Guwahati 🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cute Girl any...@Call @Girls Guwahati 🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cute Girl any...
@Call @Girls Guwahati 🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cute Girl any...
kantakumariji156
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
jackson110191
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
Enterprise Wired
 
@Call @Girls Thiruvananthapuram 🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cu...
@Call @Girls Thiruvananthapuram  🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cu...@Call @Girls Thiruvananthapuram  🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cu...
@Call @Girls Thiruvananthapuram 🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cu...
kantakumariji156
 
Implementations of Fused Deposition Modeling in real world
Implementations of Fused Deposition Modeling  in real worldImplementations of Fused Deposition Modeling  in real world
Implementations of Fused Deposition Modeling in real world
Emerging Tech
 
What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx
Stephanie Beckett
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions
 
Quantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLMQuantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLM
Vijayananda Mohire
 
AC Atlassian Coimbatore Session Slides( 22/06/2024)
AC Atlassian Coimbatore Session Slides( 22/06/2024)AC Atlassian Coimbatore Session Slides( 22/06/2024)
AC Atlassian Coimbatore Session Slides( 22/06/2024)
apoorva2579
 
5G bootcamp Sep 2020 (NPI initiative).pptx
5G bootcamp Sep 2020 (NPI initiative).pptx5G bootcamp Sep 2020 (NPI initiative).pptx
5G bootcamp Sep 2020 (NPI initiative).pptx
SATYENDRA100
 
“Intel’s Approach to Operationalizing AI in the Manufacturing Sector,” a Pres...
“Intel’s Approach to Operationalizing AI in the Manufacturing Sector,” a Pres...“Intel’s Approach to Operationalizing AI in the Manufacturing Sector,” a Pres...
“Intel’s Approach to Operationalizing AI in the Manufacturing Sector,” a Pres...
Edge AI and Vision Alliance
 
K2G - Insurtech Innovation EMEA Award 2024
K2G - Insurtech Innovation EMEA Award 2024K2G - Insurtech Innovation EMEA Award 2024
K2G - Insurtech Innovation EMEA Award 2024
The Digital Insurer
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
HackersList
 

Recently uploaded (20)

GDG Cloud Southlake #34: Neatsun Ziv: Automating Appsec
GDG Cloud Southlake #34: Neatsun Ziv: Automating AppsecGDG Cloud Southlake #34: Neatsun Ziv: Automating Appsec
GDG Cloud Southlake #34: Neatsun Ziv: Automating Appsec
 
HTTP Adaptive Streaming – Quo Vadis (2024)
HTTP Adaptive Streaming – Quo Vadis (2024)HTTP Adaptive Streaming – Quo Vadis (2024)
HTTP Adaptive Streaming – Quo Vadis (2024)
 
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALLBLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
 
DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
 
Calgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptxCalgary MuleSoft Meetup APM and IDP .pptx
Calgary MuleSoft Meetup APM and IDP .pptx
 
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
 
How to Avoid Learning the Linux-Kernel Memory Model
How to Avoid Learning the Linux-Kernel Memory ModelHow to Avoid Learning the Linux-Kernel Memory Model
How to Avoid Learning the Linux-Kernel Memory Model
 
@Call @Girls Guwahati 🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cute Girl any...
@Call @Girls Guwahati 🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cute Girl any...@Call @Girls Guwahati 🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cute Girl any...
@Call @Girls Guwahati 🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cute Girl any...
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
 
@Call @Girls Thiruvananthapuram 🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cu...
@Call @Girls Thiruvananthapuram  🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cu...@Call @Girls Thiruvananthapuram  🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cu...
@Call @Girls Thiruvananthapuram 🚒 XXXXXXXXXX 🚒 Priya Sharma Beautiful And Cu...
 
Implementations of Fused Deposition Modeling in real world
Implementations of Fused Deposition Modeling  in real worldImplementations of Fused Deposition Modeling  in real world
Implementations of Fused Deposition Modeling in real world
 
What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
 
Quantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLMQuantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLM
 
AC Atlassian Coimbatore Session Slides( 22/06/2024)
AC Atlassian Coimbatore Session Slides( 22/06/2024)AC Atlassian Coimbatore Session Slides( 22/06/2024)
AC Atlassian Coimbatore Session Slides( 22/06/2024)
 
5G bootcamp Sep 2020 (NPI initiative).pptx
5G bootcamp Sep 2020 (NPI initiative).pptx5G bootcamp Sep 2020 (NPI initiative).pptx
5G bootcamp Sep 2020 (NPI initiative).pptx
 
“Intel’s Approach to Operationalizing AI in the Manufacturing Sector,” a Pres...
“Intel’s Approach to Operationalizing AI in the Manufacturing Sector,” a Pres...“Intel’s Approach to Operationalizing AI in the Manufacturing Sector,” a Pres...
“Intel’s Approach to Operationalizing AI in the Manufacturing Sector,” a Pres...
 
K2G - Insurtech Innovation EMEA Award 2024
K2G - Insurtech Innovation EMEA Award 2024K2G - Insurtech Innovation EMEA Award 2024
K2G - Insurtech Innovation EMEA Award 2024
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
 

2023 Cyber Forecast Infographic

  • 1. What obstacles and opportunities might be in store for your organization? These 2023 forecasts from leaders at the cyber front lines reveal a range of insights and strategies, from greater emphasis on future forward readiness to the increased role organizational resilience will play in controlling exposure to threats and managing multifaceted risks. Cybersecurity in 2023 and beyond: 12 leaders share their forecasts While the stakes are high for addressing the complex cyber and risk challenges of 2023 and beyond, Deloitte can help you meet your objectives, whether you need assistance with strategy, design, implementation, or ongoing operations. We offer a unified approach to help you tackle obstacles, build new capabilities, and move forward fast—wherever you are on your journey. Learn more at Deloitte.com/us/MoveForwardFast For the challenges you can’t predict, and the opportunities you can’t pass up This publication contains general information only and Deloitte is not, by means of this publication, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This publication is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor. Deloitte shall not be responsible for any loss sustained by any person who relies on this publication. As used in this document, “Deloitte” means Deloitte & Touche LLP, a subsidiary of Deloitte LLP. Please see www.deloitte.com/us/about for a detailed description of our legal structure. Certain services may not be available to attest clients under the rules and regulations of public accounting. Copyright © 2023 Deloitte Development LLC. All rights reserved. AGILE, SECURE MODERNIZATION Vikram Kunchala Cyber Cloud and Infrastructure Leader, Deloitte & Touche LLP Proliferating cloud services create new possibilities and risks “The huge shift to cloud-based data and business functions has created unprecedented possibilities— but comes with costly regulatory missteps and damaging cyberattacks when security is not woven into the process. Organizations can enable agile, secure transformation by leveraging “secure-by- design” processes and Zero Trust principles.” Asheem Chandna Investor and Company Builder, Greylock Partners The shift-left movement will improve application security “Developers won’t be working in isolation; security improvements will be embedded in the process of application creation throughout the process from development to production.” Deborah Golden US Cyber & Strategic Risk Leader, Deloitte & Touche LLP Growing talent shortages and labor costs will lead to cyber talent consolidation and outsourcing “With cybersecurity risks and regulations increasing by the day, many organizations are scrambling to fill positions. To stay agile, they’ll need to focus on hiring niche cyber talent along with outsourcing strategies.” Jay Leek Managing Partner & Co-founder, SYN Ventures Humans can’t do it alone “The combination of ongoing talent shortages and increasing efforts from adversaries makes automation critical. Humans just can’t respond fast enough. Software is needed to fight software— for detection, response, and prevention.” Ken Gonzalez Managing Director, NightDragon Investments & Advisory Machines can’t do it alone, either “If you automate a bad process, you’re just running yourself off a cliff. You still need process best practices and people to oversee it.” Mary Galligan Crisis Management Leader, Deloitte & Touche LLP Boards will increasingly view cyber readiness as a business imperative “The role that the board plays in cyber oversight is becoming more important, as is their ability to position cyber as a strategic enabler across customer, vendor, employee, and shareholder relationships.” Asheem Chandna Investor and Company Builder, Greylock Partners Geopolitics will make the attack surface more complicated “On the attack side, threats aren’t just from individual bad actors, but also nation states. It will be very hard for organizations to manage threat protection themselves, as these attacks have high levels of sophistication.” Ken Gonzalez Managing Director, NightDragon Investments & Advisory Companies will drive innovation to solve global issues “There’s a shared sense of corporate social responsibility—a mission to protect our way of life, governments, families, and corporations— that’s driving new innovations.” Pete Renneker Technical Resilience Leader, Deloitte & Touche LLP Focus on organizational resilience will continue to grow “The multitude of supply chain, geopolitical, environmental and cyber disruptions are challenging traditional risk programs. An integrated view of risks can help lead organizations to employ new techniques and technologies to improve threat awareness and response.” Criss Bradbury Data & Privacy Solution Leader, Deloitte & Touche LLP Brand trust will be built on data-centric security “There is growing urgency for organizations to embrace data privacy, security, and compliance as mechanisms to bolster customer experience, trust, and brand perception.” Deborah Golden US Cyber & Strategic Risk Leader, Deloitte & Touche LLP Organizations can build agility with future-ready cyber tech “Breakthrough cyber tech, including AI, will lead to a more proactive risk approach as well as greater innovation, competitive differentiation, and operational excellence. Organizations need to actively build a unified cyber strategy to be agile enough to seize future opportunities before they emerge.” Kieran Norton Transformation & Emerging Technology Market Leader, Deloitte & Touche LLP Security will be a critical enabler in the adoption of emerging tech “The sustained success of IoT, Blockchain, 5G, Quantum, and other applications will largely be based on the ability to navigate and implement appropriate cybersecurity technology measures in tandem with adoption.” FUTURE FORWARD READINESS AND RESILIENT DIGITAL OPERATIONS TRUSTED CUSTOMER EXPERIENCES AND DATA USE Sharon Chand Secure Supply Chain Leader, Deloitte & Touche LLP Comprehensive supply chain security is imperative “Supply chain threats continue to evolve in complexity, requiring a greater focus on deploying and operating identity and access management (IAM) and Zero Trust capabilities to enforce authorized third-party access.” SUPPLY CHAIN SECURITY AND RISK TRANSFORMATION SECURE, EFFICIENT WORKFORCE EXPERIENCE DYNAMIC RISK PROGRAMS AND ENHANCED RESPONSE AND RECOVERY GOVERNANCE AND OPTIMIZATION Asheem Chandna Investor and Company Builder, Greylock Partners Expanding attack surfaces will be secured through increased automation “With the expanding threat surface becoming more complex for most organizations, there is a tremendous opportunity to leverage APIs that can improve automated threat detection using AI and ML.” Ramsey Hajj Cyber OT Leader, Deloitte & Touche LLP Threats to operational technologies will continue to evolve rapidly “Operational technology (OT) environments are increasingly being weaponized. This is prompting greater visibility into OT devices, networks, and an increase in monitoring tools to better correlate security of OT and IT networks.” Wendy Frank Cyber IoT Leader, Deloitte & Touche LLP Device visibility and security will be a major area of focus “As the number of IoT-connected devices grows, the attack surface grows with it. Leading organizations will need to increase their focus on device policies, procedures, and inventories, as well as closer monitoring of those devices.” SECURE, CONNECTED DEVICES AND INTELLIGENT OPERATIONS